Hidden Monitoring Based on Keystroke Dynamics in Online Examination System

نویسندگان

چکیده

The COVID-19 pandemic has accelerated the development of distance learning technologies, where online tests and exams play an important role. In testing, detection various types academic fraud, including cases examinee is falsely represented by another person, particular importance. Continuous biometric (behavioral) authentication can be a solution to counter unauthorized access. This paper proposes technology based on keystroke dynamics hidden monitoring. An application for collecting updating profiles domain users their continuous developed. efficiency reducing dimension feature space frequency alphabetic letters demonstrated. Results popular performance metrics (FAR, FRR, ERR, ROC, DET) are significantly improved already when evaluating only metric distances. For instance, ERR reduced from 10.1% 0.79%, which comparable estimates provided kNN method its optimal parameters.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security System Based on User Authentication Using Keystroke Dynamics

−Keystroke Dynamics is behavioural biometric used to measure the typing rhythm of the user when an individual types on the keyboard. It is assumed as a robust behavioural biometric. The functionality of this biometric is to measure the dwell time and flight time for changing keyboard actions. The paper focuses on enhancement of security using individual’s typing actions to distinguish between a...

متن کامل

User Authentication Based On Keystroke Dynamics

The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or ...

متن کامل

Digital Fingerprinting Based on Keystroke Dynamics

Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way to identify an attacker based on a strong behavioral biometric. We introduce a new passive digital fingerprinting technique based on keystroke dynamics biometrics. The technique is based on free text detection and analysis of keystroke dynamics. It allows building a b...

متن کامل

10 Keystroke Dynamics Based Authentication

B. Sadoun Applied Science University Amman, Jordan [email protected] Abstract This chapter deals with the applications of keystroke dynamics to authenticate/verify access to computer systems and networks. It presents our novel contribution to this area along with other related works. The use of computer systems and networks has spread at a rate completely unexpected a decade ago. Computer systems...

متن کامل

Computer User Authentication using Hidden Markov Model through Keystroke Dynamics

We present a novel computer user authentication technique using hidden Markov model (HMM) through keystroke dynamics. We propose: (i) modified HMM parameters to reduce the order of computations involved in the forward (or backward) procedure by 2 T (reduction is from 3 T N sc to T Nsc 2 where T and sc N represents the length of the keystroke pattern and the number of states of an HMM per charac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Programming and Computer Software

سال: 2022

ISSN: ['0361-7688', '1608-3261']

DOI: https://doi.org/10.1134/s0361768822060044